Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.69.133.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31727
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;64.69.133.40.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 01:32:46 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 40.133.69.64.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 40.133.69.64.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
162.243.138.119 attack
 TCP (SYN) 162.243.138.119:33795 -> port 8040, len 44
2020-05-24 19:29:15
117.84.132.73 attackspambots
FTP/21 MH Probe, BF, Hack -
2020-05-24 19:08:32
14.166.35.232 attackbotsspam
Unauthorized connection attempt from IP address 14.166.35.232 on Port 445(SMB)
2020-05-24 19:09:42
223.205.222.247 attack
Unauthorized connection attempt from IP address 223.205.222.247 on Port 445(SMB)
2020-05-24 19:20:01
13.94.62.87 attackbots
Attempted connection to port 23471.
2020-05-24 19:14:18
94.139.182.10 attackbots
Unauthorized connection attempt from IP address 94.139.182.10 on Port 445(SMB)
2020-05-24 18:57:04
206.189.73.164 attack
3x Failed Password
2020-05-24 19:25:17
113.160.224.72 attack
Attempted connection to port 445.
2020-05-24 19:13:07
210.112.21.75 attack
Attempted connection to port 445.
2020-05-24 19:10:35
220.134.235.242 attackspambots
Attempted connection to port 2323.
2020-05-24 19:10:04
122.51.254.221 attackbots
SSH Brute-Force Attack
2020-05-24 19:11:05
65.204.25.2 attackbotsspam
Unauthorized connection attempt from IP address 65.204.25.2 on Port 445(SMB)
2020-05-24 19:21:48
162.243.138.106 attack
 TCP (SYN) 162.243.138.106:51592 -> port 44818, len 44
2020-05-24 19:00:22
202.200.142.251 attackspam
Invalid user ooa from 202.200.142.251 port 34090
2020-05-24 18:52:01
197.253.19.74 attackspam
May 24 08:18:56 pi sshd[12714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.253.19.74 
May 24 08:18:58 pi sshd[12714]: Failed password for invalid user zvx from 197.253.19.74 port 2649 ssh2
2020-05-24 19:29:42

Recently Reported IPs

153.226.54.151 141.183.150.168 156.121.89.136 99.151.178.111
29.126.204.146 15.139.53.177 134.65.109.0 120.0.215.61
160.11.54.127 113.56.242.58 230.27.6.196 159.50.146.8
95.235.113.190 119.3.83.125 70.136.94.24 184.249.130.16
196.125.101.29 109.48.205.121 227.76.23.96 203.89.22.205